@@ -561,15 +561,19 @@ <h3>Use Cases and Requirements</h3>
561
561
</ p >
562
562
563
563
< p >
564
- While digital proofs, a subset of which are digital signatures, are required
565
- to ensure the protection of a < a > verifiable credential</ a > , this specification
566
- does not standarize on any single digital signature format. At the time of
567
- publication, Working Group members had implemented
564
+ Digital proof mechanisms, a subset of which are digital signatures, are required
565
+ to ensure the protection of a < a > verifiable credential</ a > . Having and
566
+ validating proofs, which may be dependent on the syntax of the proof
567
+ (for example, using the JWS of a JWT for proofing a key holder), are
568
+ an essential part of processing a < a > verifiable credential</ a > . At the time
569
+ of publication, Working Group members had implemented
568
570
< a > verifiable credentials</ a > using at least three proof mechanisms:
569
571
JSON Web Tokens [[JWT]], Linked Data Signatures [[?LD-SIGNATURES]], and
570
572
Camenisch-Lysyanskaya Zero-Knowledge Proofs [[?CL-SIGNATURES]]. The group
571
573
expects some of these mechanisms, as well as new ones, to mature independently
572
- and become standardized in time. One of the goals of this specification is to
574
+ and become standardized in time. Given that there are multiple valid
575
+ proof mechanisms, this specification does not standardize on any
576
+ single digital signature mechanism. One of the goals of this specification is to
573
577
provide a data model that can be protected by a variety of current and future
574
578
digital proof mechanisms. Conformance to this specification does not
575
579
depend on the details of a particular proof mechanism; it requires clearly
0 commit comments